Security for Cloud Computing: 10 Steps to Ensure Success V3.0

Cloud Standards Customer Council
Cloud Standards Customer CouncilCloud Standards Customer Council
Security for Cloud Computing:
10 Steps to Ensure Success Version 3.0
Webinar January 10, 2018
http://www.cloud-council.org/deliverables/security-for-cloud-computing-10-steps-to-ensure-success.htm
©2018 Cloud Standards Customer Council 2
Tracie
Berardi
Program Manager
Cloud Standards Customer Council
Moderator
Claude
Baudoin
Principal, cébé IT & Knowledge Management
Cloud Standards Customer Council
Steering Committee member
Mike
Edwards
Mike Edwards
Cloud Computing Standards expert
IBM Cloud PaaS Evangelist
Chris
Dotson
Senior Technical Staff Member and Executive
Architect, IBM Watson and Cloud Platform
Speakers
©2018 Cloud Standards Customer Council 3
The Cloud Standards Customer Council
THE Customer’s Voice for Cloud Standards!
• Provide customer-led guidance to multiple cloud
standards-defining bodies
• Establishing criteria for open
standards-based cloud computing
700+ Organizations
participating
2017 Deliverables
 Cloud Customer Architecture for Hybrid Integration
 Impact of Cloud Computing on Healthcare v2.0
 Cloud Customer Architecture for API Management
 Data Residency Challenges
 Cloud Customer Architecture for Blockchain
 Cloud Customer Architecture for Big Data and Analytics v2.0
 Hybrid Cloud Considerations for Big Data and Analytics
 Practical Guide to Cloud Management Platforms
 Practical Guide to Cloud Computing v3.0
 Interoperability and Portability for Cloud Computing: A Guide v2.0
 Security for Cloud Computing: 10 Steps to Ensure Success v3.0
http://cloud-council.org2018 Projects
 Migrating Apps to Public Cloud Services: Roadmap for Success v2.0
 Cloud Customer Architecture for Artificial Intelligence
 And more!
Security for Cloud Computing: 10 Steps to Ensure
Success, Version 3
Revision Highlights
• New worldwide privacy regulations
taken into account
• New and updated cloud security
standards added
• Data residency considerations added
• More emphasis given to security
logging and monitoring
• Information governance framework
highlighted more prominently
• Key management services to
safeguard cryptographic keys added
• Security for continuous delivery and
deployment explained
• Managing identity and access of
services emphasized
• References to additional CSCC
Security whitepapers added
©2017 Cloud Standards Customer Council 4
©2018 Cloud Standards Customer Council 5
Cloud Security Risks
Risks
Despite inherent loss of control implied by adoption of cloud computing,
customers must take responsibility for impact on security and privacy for their
business.
 Loss of governance
 Responsibility ambiguity
 Compliance & legal risks
 Visibility & audit
 Handling of security incidents
 Isolation failure
 Authentication & authorization
 Management interface vulnerability
 Application protection
 Data protection
 Personal data regulation
 Insecure or incomplete data deletion
 Malicious behaviour of insiders
 Business failure of provider
 Service unavailability
 Vendor lock-in
©2018 Cloud Standards Customer Council 6
CSCC Security for Cloud Computing:
10 Steps to Ensure Success
10 Steps to Manage Cloud Security
A reference to help enterprise IT & business decision
makers as they analyze and consider the security
implications of cloud computing on their business.
1. Ensure effective governance, risk & compliance
2. Audit operational & business processes
3. Manage people, roles & identities
4. Ensure proper protection of data & information
5. Enforce privacy policies
6. Assess the security provisions for cloud applications
7. Ensure cloud networks & connections are secure
8. Evaluate security controls on physical infrastructure & facilities
9. Manage security terms in the cloud service agreement
10. Understand the security requirements of the exit process
““The CSCC has created a
practical guide to help those
with information security
expertise as well as those that
don’t have domain expertise.
This work will help
organizations step through ten
areas to be cognizant of when
evaluating cloud providers.
The end effect is helping
companies avoid decisions that
put their data and service at
risk.” Ryan Kean, Senior
Director, Enterprise
Architecture, The Kroger
Company
©2018 Cloud Standards Customer Council 7
Step 1: Ensure effective governance, risk and compliance
GRC Requirements
 Cloud computing presents different risks than
traditional IT solutions
 A formal information governance framework
establishes chains of responsibility, authority, and
communication
 Customers must understand their risk tolerance and
must focus on mitigating risks most crucial to the
organization
 Customers must fully understand specific laws or
regulations that apply to the services (data
retention, privacy requirements, etc.)
 Customers should be notified if any breach occurs
regardless if the customer is directly impacted
 Primary means to ensure application and data
security is through Cloud Service Agreement
ISO 27018
Data Protection for Cloud Services
ISO 27017
Information Security Controls
for Cloud Services
©2018 Cloud Standards Customer Council 8
Step 2: Audit operational & business processes
Audit Requirements
 Security audit of cloud service
providers is essential
 Security audits should be carried out
by appropriately skilled staff
 Security audits should leverage an
established standard for security
controls
 Typically done as part of a formal
certification process
Critical Focus Areas
 Understand the internal control
environment of the provider
• Ensure isolation in a multi-tenant
environment
• Provide protection of customer
assets from provider’s staff
 Ensure appropriate access to
provider’s events, logs and audit trail
 Self manage and monitor the usage of
cloud hosted services
CADF
©2018 Cloud Standards Customer Council 9
Step 3: Manage people, roles & identities
Considerations
 Key principle: limit access to what each
role requires
 Cloud service provider should support:
• Federated identity management and/or
single sign-on (see platforms at right)
• Delegated user administration
• Strong, multi-factor authentication
• Role, entitlement and policy
management
• Identity and access auditing and
reporting – needed by customers for
assurance and regulatory compliance
• Service identity & access management
 Monitoring and logging of access to the
provider’s management platform
©2018 Cloud Standards Customer Council 10
Step 4: Ensure proper protection of data & information
Considerations
 Data protection is a component of enterprise risk
management
 It is about confidentiality, integrity, availability
 Applies to data at rest as well as data in motion
 Cloud deployment model (XaaS) affects who is
responsible for handling security controls
 List of key controls for securing data in the cloud:
• Create a data asset catalog (considering all
forms of data)
• Consider privacy requirements (see Step 5)
• Require security logging and monitoring
(particularly, data activity monitoring)
• Require proactive notification of incidents
ISO 27017
Information Security Controls
for Cloud Services
KMIP
©2018 Cloud Standards Customer Council 11
Step 5: Enforce privacy policies
Considerations
 Privacy is distinct from security. It’s mostly about
handling of personally identifiable information (PII)
• Includes right to inspect and correct data, and
in some cases to be forgotten
 Evolving and gaining importance
• Multiple law and regulations (e.g., HIPAA)
• EU’s GDPR (in force from 25 May 2018)
 PII must be tagged correctly, stored securely (e.g.,
encrypted, anonymized or obfuscated), and made
available only to authorized users
 Primary responsibility typically remains with the
cloud customer
 In the Cloud Services Agreement, define
clearly customer vs provider responsibilities
 Customers should monitor compliance
ISO 27018
Data Protection for Cloud Services
©2017 Cloud Standards Customer Council 11
©2018 Cloud Standards Customer Council 12
Step 6: Assess the security provisions for cloud applications
Considerations
 Organizations must apply same diligence to application
security in the cloud as in a traditional IT environment
 Split of responsibilities between customer and cloud
provider depends on the deployment model
• IaaS:
• Customer responsible for most security components
• Platform as a Service
• Provider responsible for secure operating system,
middleware, network, etc.
• Customer responsible for application security
• Software as a Service
• Provider provides application security
• Customer must understand data encryption
standards, audit capabilities, SLAs
 Incorporate security into a continuous delivery and
deployment approach: DevOps  SecDevOps
ISO 27034
Application Security
©2017 Cloud Standards Customer Council 12
ISO/IEC JTC1
SC 22/WG 23 TR 24772
©2018 Cloud Standards Customer Council 13
Step 7: Ensure cloud networks & connections are secure
Considerations
 Customer should gain assurance on
provider’s internal and external network
security
 External network requirements
• Traffic screening
• Denial of service protection
• Intrusion detection and prevention
• Logging and notification
 Internal network requirements
• Protect clients from each other
• Allow for network segmentation
• Protect the provider’s network
• Monitor for intrusion attempts
ISO 20733
Network Security
©2018 Cloud Standards Customer Council 14
Considerations
 Customer should gain assurance on
provider’s physical security
• Physical infrastructure & facilities
should be in a secure area
• Protection against external and
environmental threats
• Control of personnel in working
areas
• Equipment security controls
• Controls on supporting utilities
• Control security of cabling
• Proper equipment maintenance
• Control of removal and disposal of
assets
• Human resource security
• DR and BC plans in place
ISO 27017
Information Security Controls
for Cloud Services
Step 8: Evaluate security controls on physical infrastructure
& facilities
©2018 Cloud Standards Customer Council 15
Step 9: Manage security terms in the cloud service agreement
(CSA)
Considerations
 Security clauses in the CSA apply to cloud
provider as well as any peer providers
used to supply part of the service
 CSA should explicitly document that the
provider must notify the customer of any
breach in their system
 Establish metrics for performance and
effectiveness of information security
management
 Require data compliance reports to
communicate the strengths and
weaknesses of controls, services and
mechanisms.
 Responsibilities will differ between IaaS,
PaaS, and SaaS.
ISO 19086
Cloud SLA
Framework
©2018 Cloud Standards Customer Council 16
Step 10: Understand the security requirements of the exit
process
Considerations
 Once termination process is complete, “the
right to be forgotten” should be achieved
 No customer data should reside with
provider after the exit process
 Require provider to cleanse log and audit
data
• Some jurisdictions may require
retention of records of this type for
specified periods by law
 Exit process must allow customer a smooth
transition without loss or disclosure of data
ISO 27018
Data Protection for Cloud Services
ISO 27017
Information Security Controls
for Cloud Services
Summary
 Cloud computing can have a positive impact on
security and privacy for customer organizations
 Cloud computing presents unique security and
privacy challenges that need to be addressed
 Cloud security and privacy is a joint responsibility
between customers and providers
• Customers do not abdicate sole responsibility to their
provider
 Responsibility split needs to be formalized in the
Cloud Services Agreement
©2017 Cloud Standards Customer Council 17
Call to Action
Join the CSCC Now!
– To have an impact on customer use case based standards requirements
– To learn about all Cloud Standards within one organization
– To help define the CSCC’s future roadmap
– Membership is free & easy: http://www.cloud-council.org/become-a-
member
Get Involved!
– Join one or more of the CSCC Working Groups
http://www.cloud-council.org/workinggroups
Leverage CSCC Collateral
– Visit http://www.cloud-council.org/resource-hub
©2017 Cloud Standards Customer Council 18
Additional CSCC Resources
 Data Residency Challenges
 http://www.cloud-council.org/deliverables/data-residency-challenges.htm
 Cloud Customer Architecture for Securing Workloads on Cloud Services
 http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm
 Cloud Security Standards: What to Expect and What to Negotiate v2.0
 http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-and-what-to-negotiate.htm
 Practical Guide to Cloud Service Agreements v2.0
 http://www.cloud-council.org/deliverables/practical-guide-to-cloud-service-agreements.htm
 Public Cloud Service Agreements: What to Expect and What to Negotiate v2.0
 http://www.cloud-council.org/deliverables/public-cloud-service-agreements-what-to-expect-and-what-to-negotiate.htm
 Practical Guide to Cloud Computing v3.0
 http://www.cloud-council.org/deliverables/practical-guide-to-cloud-computing.htm
 Migrating Applications to Public Cloud Services: Roadmap for Success
 http://www.cloud-council.org/deliverables/migrating-applications-to-public-cloud-services-roadmap-for-success.htm
 Practical Guide to Hybrid Cloud Computing
 http://www.cloud-council.org/deliverables/practical-guide-to-hybrid-cloud-computing.htm
 Practical Guide to Platform-as-a-Service
 http://www.cloud-council.org/deliverables/practical-guide-to-platform-as-a-service.htm
 Practical Guide to Cloud Management Platforms
 http://www.cloud-council.org/deliverables/practical-guide-to-cloud-management-platforms.htm
©2017 Cloud Standards Customer Council 19
Thank You!
Join the conversation
www.cloud-council.org
1 sur 20

Recommandé

Hybrid Cloud Considerations for Big Data and Analytics par
Hybrid Cloud Considerations for Big Data and AnalyticsHybrid Cloud Considerations for Big Data and Analytics
Hybrid Cloud Considerations for Big Data and AnalyticsCloud Standards Customer Council
825 vues31 diapositives
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..." par
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."Gustavo Cuervo
977 vues16 diapositives
Impact of Cloud Computing on Healthcare v2.0 par
Impact of Cloud Computing on Healthcare v2.0Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0Cloud Standards Customer Council
1.3K vues18 diapositives
Interoperability and Portability for Cloud Computing: A Guide V2.0 par
Interoperability and Portability for Cloud Computing: A Guide V2.0Interoperability and Portability for Cloud Computing: A Guide V2.0
Interoperability and Portability for Cloud Computing: A Guide V2.0Cloud Standards Customer Council
483 vues21 diapositives
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0 par
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
824 vues20 diapositives
Cloud Customer Architecture for Big Data and Analytics V2.0 par
Cloud Customer Architecture for Big Data and Analytics V2.0Cloud Customer Architecture for Big Data and Analytics V2.0
Cloud Customer Architecture for Big Data and Analytics V2.0Cloud Standards Customer Council
721 vues37 diapositives

Contenu connexe

Tendances

Practical Guide to Cloud Management Platforms par
Practical Guide to Cloud Management PlatformsPractical Guide to Cloud Management Platforms
Practical Guide to Cloud Management PlatformsCloud Standards Customer Council
2.6K vues21 diapositives
Cloud Customer Architecture for API Management par
Cloud Customer Architecture for API ManagementCloud Customer Architecture for API Management
Cloud Customer Architecture for API ManagementCloud Standards Customer Council
700 vues20 diapositives
Cloud Customer Architecture for Big Data and Analytics par
Cloud Customer Architecture for Big Data and AnalyticsCloud Customer Architecture for Big Data and Analytics
Cloud Customer Architecture for Big Data and AnalyticsCloud Standards Customer Council
552 vues27 diapositives
PECB Webinar: The alignment of Information Security in Service Management par
PECB Webinar: The alignment of Information Security in Service ManagementPECB Webinar: The alignment of Information Security in Service Management
PECB Webinar: The alignment of Information Security in Service ManagementPECB
1.2K vues42 diapositives
Cloud Customer Architecture for Hybrid Integration par
Cloud Customer Architecture for Hybrid IntegrationCloud Customer Architecture for Hybrid Integration
Cloud Customer Architecture for Hybrid IntegrationCloud Standards Customer Council
1.1K vues24 diapositives
Practical Guide to Platform-as-a-Service par
Practical Guide to Platform-as-a-Service Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service Cloud Standards Customer Council
562 vues20 diapositives

Tendances(20)

PECB Webinar: The alignment of Information Security in Service Management par PECB
PECB Webinar: The alignment of Information Security in Service ManagementPECB Webinar: The alignment of Information Security in Service Management
PECB Webinar: The alignment of Information Security in Service Management
PECB 1.2K vues
PSOCLD 1007 Cisco Hybrid Cloud Platform for Google Cloud par Rohit Agarwalla
PSOCLD 1007 Cisco Hybrid Cloud Platform for Google CloudPSOCLD 1007 Cisco Hybrid Cloud Platform for Google Cloud
PSOCLD 1007 Cisco Hybrid Cloud Platform for Google Cloud
Rohit Agarwalla377 vues
Becomming a cloud governance ninja linthicum interop fall 2013 par David Linthicum
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
David Linthicum2.7K vues
Geting cloud architecture right the first time linthicum interop fall 2013 par David Linthicum
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
David Linthicum1.8K vues
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation par PT Datacomm Diangraha
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationHybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hyper Stratus Migrating Applications to the Cloud par bhgolden
Hyper Stratus Migrating Applications to the CloudHyper Stratus Migrating Applications to the Cloud
Hyper Stratus Migrating Applications to the Cloud
bhgolden1K vues
Calculating the true value of industry specific clouds linthicum par David Linthicum
Calculating the true value of industry specific clouds linthicumCalculating the true value of industry specific clouds linthicum
Calculating the true value of industry specific clouds linthicum
David Linthicum2.5K vues
Cloud Services Integration Automation-External par Sukumar Nayak
Cloud Services Integration Automation-ExternalCloud Services Integration Automation-External
Cloud Services Integration Automation-External
Sukumar Nayak2.5K vues
Sukumar Nayak-Agile-DevOps-Cloud Management par Sukumar Nayak
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak4.4K vues
Software Association of Oregon Cloud Computing Presentation par ddcarr
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentation
ddcarr1.6K vues

Similaire à Security for Cloud Computing: 10 Steps to Ensure Success V3.0

Cloud Security Standards: What to Expect and What to Negotiate V2.0 par
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
1.9K vues21 diapositives
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ... par
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...Alan Yau Ti Dun
323 vues24 diapositives
Legal And Regulatory Issues Cloud Computing...V2.0 par
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
1.6K vues34 diapositives
Transforming cloud security into an advantage par
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
732 vues49 diapositives
ISO 27017 – What are the Business Advantages of Cloud Security? par
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?Alvin Integrated Services [AIS]
350 vues42 diapositives
ISO 27001 In The Age Of Privacy par
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyControlCase
415 vues26 diapositives

Similaire à Security for Cloud Computing: 10 Steps to Ensure Success V3.0(20)

Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ... par Alan Yau Ti Dun
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Alan Yau Ti Dun323 vues
Legal And Regulatory Issues Cloud Computing...V2.0 par David Spinks
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks1.6K vues
Transforming cloud security into an advantage par Moshe Ferber
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber732 vues
ISO 27001 In The Age Of Privacy par ControlCase
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of Privacy
ControlCase415 vues
AFAC session 2 - September 8, 2014 par KBIZEAU
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
KBIZEAU725 vues
OneAudit™ - Assess Once, Certify to Many par ControlCase
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to Many
ControlCase704 vues
Security Management in the Cloud par GaryArdito
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
GaryArdito550 vues
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille par Martin Thompson
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian ScilleITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille
ITAM UK 2017 ITAM Risks in Cloud Era Eric Chiu & Ian Scille
Martin Thompson282 vues
CSA Introduction 2013 David Ross par Graeme Wood
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood802 vues
dtechnClouologyassociatepart2 par Anne Starr
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
Anne Starr87 vues
IBM Relay 2015: Securing the Future par IBM
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM1.9K vues
gkkCloudtechnologyassociate(cta)day 2 par Anne Starr
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
Anne Starr89 vues
PCI DSS Compliance in the Cloud par ControlCase
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
ControlCase565 vues
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa... par Skybox Security
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Skybox Security695 vues

Plus de Cloud Standards Customer Council

What's New in Cloud Foundry par
What's New in Cloud FoundryWhat's New in Cloud Foundry
What's New in Cloud FoundryCloud Standards Customer Council
450 vues44 diapositives
Where's My Data? Managing the Data Residency Challenge par
Where's My Data? Managing the Data Residency ChallengeWhere's My Data? Managing the Data Residency Challenge
Where's My Data? Managing the Data Residency ChallengeCloud Standards Customer Council
429 vues15 diapositives
Cloud Customer Architecture for Blockchain par
Cloud Customer Architecture for BlockchainCloud Customer Architecture for Blockchain
Cloud Customer Architecture for BlockchainCloud Standards Customer Council
1.9K vues23 diapositives
Hyperledger: Advancing Blockchain Technology for Business par
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessCloud Standards Customer Council
1.9K vues25 diapositives
Data Residency: Challenges and the Need for Standards par
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsCloud Standards Customer Council
459 vues20 diapositives
Interoperability and Portability for Cloud Computing: A Guide par
Interoperability and Portability for Cloud Computing: A GuideInteroperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A GuideCloud Standards Customer Council
1.7K vues20 diapositives

Plus de Cloud Standards Customer Council(12)

Dernier

The Path to DevOps par
The Path to DevOpsThe Path to DevOps
The Path to DevOpsJohn Valentino
5 vues6 diapositives
Dapr Unleashed: Accelerating Microservice Development par
Dapr Unleashed: Accelerating Microservice DevelopmentDapr Unleashed: Accelerating Microservice Development
Dapr Unleashed: Accelerating Microservice DevelopmentMiroslav Janeski
12 vues29 diapositives
Navigating container technology for enhanced security by Niklas Saari par
Navigating container technology for enhanced security by Niklas SaariNavigating container technology for enhanced security by Niklas Saari
Navigating container technology for enhanced security by Niklas SaariMetosin Oy
14 vues34 diapositives
Team Transformation Tactics for Holistic Testing and Quality (Japan Symposium... par
Team Transformation Tactics for Holistic Testing and Quality (Japan Symposium...Team Transformation Tactics for Holistic Testing and Quality (Japan Symposium...
Team Transformation Tactics for Holistic Testing and Quality (Japan Symposium...Lisi Hocke
35 vues124 diapositives
Generic or specific? Making sensible software design decisions par
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisionsBert Jan Schrijver
6 vues60 diapositives
Introduction to Maven par
Introduction to MavenIntroduction to Maven
Introduction to MavenJohn Valentino
6 vues10 diapositives

Dernier(20)

Dapr Unleashed: Accelerating Microservice Development par Miroslav Janeski
Dapr Unleashed: Accelerating Microservice DevelopmentDapr Unleashed: Accelerating Microservice Development
Dapr Unleashed: Accelerating Microservice Development
Navigating container technology for enhanced security by Niklas Saari par Metosin Oy
Navigating container technology for enhanced security by Niklas SaariNavigating container technology for enhanced security by Niklas Saari
Navigating container technology for enhanced security by Niklas Saari
Metosin Oy14 vues
Team Transformation Tactics for Holistic Testing and Quality (Japan Symposium... par Lisi Hocke
Team Transformation Tactics for Holistic Testing and Quality (Japan Symposium...Team Transformation Tactics for Holistic Testing and Quality (Japan Symposium...
Team Transformation Tactics for Holistic Testing and Quality (Japan Symposium...
Lisi Hocke35 vues
Generic or specific? Making sensible software design decisions par Bert Jan Schrijver
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisions
Bootstrapping vs Venture Capital.pptx par Zeljko Svedic
Bootstrapping vs Venture Capital.pptxBootstrapping vs Venture Capital.pptx
Bootstrapping vs Venture Capital.pptx
Zeljko Svedic14 vues
Top-5-production-devconMunich-2023-v2.pptx par Tier1 app
Top-5-production-devconMunich-2023-v2.pptxTop-5-production-devconMunich-2023-v2.pptx
Top-5-production-devconMunich-2023-v2.pptx
Tier1 app6 vues
20231129 - Platform @ localhost 2023 - Application-driven infrastructure with... par sparkfabrik
20231129 - Platform @ localhost 2023 - Application-driven infrastructure with...20231129 - Platform @ localhost 2023 - Application-driven infrastructure with...
20231129 - Platform @ localhost 2023 - Application-driven infrastructure with...
sparkfabrik8 vues
FIMA 2023 Neo4j & FS - Entity Resolution.pptx par Neo4j
FIMA 2023 Neo4j & FS - Entity Resolution.pptxFIMA 2023 Neo4j & FS - Entity Resolution.pptx
FIMA 2023 Neo4j & FS - Entity Resolution.pptx
Neo4j17 vues
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P... par NimaTorabi2
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
NimaTorabi215 vues
Gen Apps on Google Cloud PaLM2 and Codey APIs in Action par Márton Kodok
Gen Apps on Google Cloud PaLM2 and Codey APIs in ActionGen Apps on Google Cloud PaLM2 and Codey APIs in Action
Gen Apps on Google Cloud PaLM2 and Codey APIs in Action
Márton Kodok15 vues
tecnologia18.docx par nosi6702
tecnologia18.docxtecnologia18.docx
tecnologia18.docx
nosi67025 vues
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx par animuscrm
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
2023-November-Schneider Electric-Meetup-BCN Admin Group.pptx
animuscrm15 vues

Security for Cloud Computing: 10 Steps to Ensure Success V3.0

  • 1. Security for Cloud Computing: 10 Steps to Ensure Success Version 3.0 Webinar January 10, 2018 http://www.cloud-council.org/deliverables/security-for-cloud-computing-10-steps-to-ensure-success.htm
  • 2. ©2018 Cloud Standards Customer Council 2 Tracie Berardi Program Manager Cloud Standards Customer Council Moderator Claude Baudoin Principal, cébé IT & Knowledge Management Cloud Standards Customer Council Steering Committee member Mike Edwards Mike Edwards Cloud Computing Standards expert IBM Cloud PaaS Evangelist Chris Dotson Senior Technical Staff Member and Executive Architect, IBM Watson and Cloud Platform Speakers
  • 3. ©2018 Cloud Standards Customer Council 3 The Cloud Standards Customer Council THE Customer’s Voice for Cloud Standards! • Provide customer-led guidance to multiple cloud standards-defining bodies • Establishing criteria for open standards-based cloud computing 700+ Organizations participating 2017 Deliverables  Cloud Customer Architecture for Hybrid Integration  Impact of Cloud Computing on Healthcare v2.0  Cloud Customer Architecture for API Management  Data Residency Challenges  Cloud Customer Architecture for Blockchain  Cloud Customer Architecture for Big Data and Analytics v2.0  Hybrid Cloud Considerations for Big Data and Analytics  Practical Guide to Cloud Management Platforms  Practical Guide to Cloud Computing v3.0  Interoperability and Portability for Cloud Computing: A Guide v2.0  Security for Cloud Computing: 10 Steps to Ensure Success v3.0 http://cloud-council.org2018 Projects  Migrating Apps to Public Cloud Services: Roadmap for Success v2.0  Cloud Customer Architecture for Artificial Intelligence  And more!
  • 4. Security for Cloud Computing: 10 Steps to Ensure Success, Version 3 Revision Highlights • New worldwide privacy regulations taken into account • New and updated cloud security standards added • Data residency considerations added • More emphasis given to security logging and monitoring • Information governance framework highlighted more prominently • Key management services to safeguard cryptographic keys added • Security for continuous delivery and deployment explained • Managing identity and access of services emphasized • References to additional CSCC Security whitepapers added ©2017 Cloud Standards Customer Council 4
  • 5. ©2018 Cloud Standards Customer Council 5 Cloud Security Risks Risks Despite inherent loss of control implied by adoption of cloud computing, customers must take responsibility for impact on security and privacy for their business.  Loss of governance  Responsibility ambiguity  Compliance & legal risks  Visibility & audit  Handling of security incidents  Isolation failure  Authentication & authorization  Management interface vulnerability  Application protection  Data protection  Personal data regulation  Insecure or incomplete data deletion  Malicious behaviour of insiders  Business failure of provider  Service unavailability  Vendor lock-in
  • 6. ©2018 Cloud Standards Customer Council 6 CSCC Security for Cloud Computing: 10 Steps to Ensure Success 10 Steps to Manage Cloud Security A reference to help enterprise IT & business decision makers as they analyze and consider the security implications of cloud computing on their business. 1. Ensure effective governance, risk & compliance 2. Audit operational & business processes 3. Manage people, roles & identities 4. Ensure proper protection of data & information 5. Enforce privacy policies 6. Assess the security provisions for cloud applications 7. Ensure cloud networks & connections are secure 8. Evaluate security controls on physical infrastructure & facilities 9. Manage security terms in the cloud service agreement 10. Understand the security requirements of the exit process ““The CSCC has created a practical guide to help those with information security expertise as well as those that don’t have domain expertise. This work will help organizations step through ten areas to be cognizant of when evaluating cloud providers. The end effect is helping companies avoid decisions that put their data and service at risk.” Ryan Kean, Senior Director, Enterprise Architecture, The Kroger Company
  • 7. ©2018 Cloud Standards Customer Council 7 Step 1: Ensure effective governance, risk and compliance GRC Requirements  Cloud computing presents different risks than traditional IT solutions  A formal information governance framework establishes chains of responsibility, authority, and communication  Customers must understand their risk tolerance and must focus on mitigating risks most crucial to the organization  Customers must fully understand specific laws or regulations that apply to the services (data retention, privacy requirements, etc.)  Customers should be notified if any breach occurs regardless if the customer is directly impacted  Primary means to ensure application and data security is through Cloud Service Agreement ISO 27018 Data Protection for Cloud Services ISO 27017 Information Security Controls for Cloud Services
  • 8. ©2018 Cloud Standards Customer Council 8 Step 2: Audit operational & business processes Audit Requirements  Security audit of cloud service providers is essential  Security audits should be carried out by appropriately skilled staff  Security audits should leverage an established standard for security controls  Typically done as part of a formal certification process Critical Focus Areas  Understand the internal control environment of the provider • Ensure isolation in a multi-tenant environment • Provide protection of customer assets from provider’s staff  Ensure appropriate access to provider’s events, logs and audit trail  Self manage and monitor the usage of cloud hosted services CADF
  • 9. ©2018 Cloud Standards Customer Council 9 Step 3: Manage people, roles & identities Considerations  Key principle: limit access to what each role requires  Cloud service provider should support: • Federated identity management and/or single sign-on (see platforms at right) • Delegated user administration • Strong, multi-factor authentication • Role, entitlement and policy management • Identity and access auditing and reporting – needed by customers for assurance and regulatory compliance • Service identity & access management  Monitoring and logging of access to the provider’s management platform
  • 10. ©2018 Cloud Standards Customer Council 10 Step 4: Ensure proper protection of data & information Considerations  Data protection is a component of enterprise risk management  It is about confidentiality, integrity, availability  Applies to data at rest as well as data in motion  Cloud deployment model (XaaS) affects who is responsible for handling security controls  List of key controls for securing data in the cloud: • Create a data asset catalog (considering all forms of data) • Consider privacy requirements (see Step 5) • Require security logging and monitoring (particularly, data activity monitoring) • Require proactive notification of incidents ISO 27017 Information Security Controls for Cloud Services KMIP
  • 11. ©2018 Cloud Standards Customer Council 11 Step 5: Enforce privacy policies Considerations  Privacy is distinct from security. It’s mostly about handling of personally identifiable information (PII) • Includes right to inspect and correct data, and in some cases to be forgotten  Evolving and gaining importance • Multiple law and regulations (e.g., HIPAA) • EU’s GDPR (in force from 25 May 2018)  PII must be tagged correctly, stored securely (e.g., encrypted, anonymized or obfuscated), and made available only to authorized users  Primary responsibility typically remains with the cloud customer  In the Cloud Services Agreement, define clearly customer vs provider responsibilities  Customers should monitor compliance ISO 27018 Data Protection for Cloud Services ©2017 Cloud Standards Customer Council 11
  • 12. ©2018 Cloud Standards Customer Council 12 Step 6: Assess the security provisions for cloud applications Considerations  Organizations must apply same diligence to application security in the cloud as in a traditional IT environment  Split of responsibilities between customer and cloud provider depends on the deployment model • IaaS: • Customer responsible for most security components • Platform as a Service • Provider responsible for secure operating system, middleware, network, etc. • Customer responsible for application security • Software as a Service • Provider provides application security • Customer must understand data encryption standards, audit capabilities, SLAs  Incorporate security into a continuous delivery and deployment approach: DevOps  SecDevOps ISO 27034 Application Security ©2017 Cloud Standards Customer Council 12 ISO/IEC JTC1 SC 22/WG 23 TR 24772
  • 13. ©2018 Cloud Standards Customer Council 13 Step 7: Ensure cloud networks & connections are secure Considerations  Customer should gain assurance on provider’s internal and external network security  External network requirements • Traffic screening • Denial of service protection • Intrusion detection and prevention • Logging and notification  Internal network requirements • Protect clients from each other • Allow for network segmentation • Protect the provider’s network • Monitor for intrusion attempts ISO 20733 Network Security
  • 14. ©2018 Cloud Standards Customer Council 14 Considerations  Customer should gain assurance on provider’s physical security • Physical infrastructure & facilities should be in a secure area • Protection against external and environmental threats • Control of personnel in working areas • Equipment security controls • Controls on supporting utilities • Control security of cabling • Proper equipment maintenance • Control of removal and disposal of assets • Human resource security • DR and BC plans in place ISO 27017 Information Security Controls for Cloud Services Step 8: Evaluate security controls on physical infrastructure & facilities
  • 15. ©2018 Cloud Standards Customer Council 15 Step 9: Manage security terms in the cloud service agreement (CSA) Considerations  Security clauses in the CSA apply to cloud provider as well as any peer providers used to supply part of the service  CSA should explicitly document that the provider must notify the customer of any breach in their system  Establish metrics for performance and effectiveness of information security management  Require data compliance reports to communicate the strengths and weaknesses of controls, services and mechanisms.  Responsibilities will differ between IaaS, PaaS, and SaaS. ISO 19086 Cloud SLA Framework
  • 16. ©2018 Cloud Standards Customer Council 16 Step 10: Understand the security requirements of the exit process Considerations  Once termination process is complete, “the right to be forgotten” should be achieved  No customer data should reside with provider after the exit process  Require provider to cleanse log and audit data • Some jurisdictions may require retention of records of this type for specified periods by law  Exit process must allow customer a smooth transition without loss or disclosure of data ISO 27018 Data Protection for Cloud Services ISO 27017 Information Security Controls for Cloud Services
  • 17. Summary  Cloud computing can have a positive impact on security and privacy for customer organizations  Cloud computing presents unique security and privacy challenges that need to be addressed  Cloud security and privacy is a joint responsibility between customers and providers • Customers do not abdicate sole responsibility to their provider  Responsibility split needs to be formalized in the Cloud Services Agreement ©2017 Cloud Standards Customer Council 17
  • 18. Call to Action Join the CSCC Now! – To have an impact on customer use case based standards requirements – To learn about all Cloud Standards within one organization – To help define the CSCC’s future roadmap – Membership is free & easy: http://www.cloud-council.org/become-a- member Get Involved! – Join one or more of the CSCC Working Groups http://www.cloud-council.org/workinggroups Leverage CSCC Collateral – Visit http://www.cloud-council.org/resource-hub ©2017 Cloud Standards Customer Council 18
  • 19. Additional CSCC Resources  Data Residency Challenges  http://www.cloud-council.org/deliverables/data-residency-challenges.htm  Cloud Customer Architecture for Securing Workloads on Cloud Services  http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm  Cloud Security Standards: What to Expect and What to Negotiate v2.0  http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-and-what-to-negotiate.htm  Practical Guide to Cloud Service Agreements v2.0  http://www.cloud-council.org/deliverables/practical-guide-to-cloud-service-agreements.htm  Public Cloud Service Agreements: What to Expect and What to Negotiate v2.0  http://www.cloud-council.org/deliverables/public-cloud-service-agreements-what-to-expect-and-what-to-negotiate.htm  Practical Guide to Cloud Computing v3.0  http://www.cloud-council.org/deliverables/practical-guide-to-cloud-computing.htm  Migrating Applications to Public Cloud Services: Roadmap for Success  http://www.cloud-council.org/deliverables/migrating-applications-to-public-cloud-services-roadmap-for-success.htm  Practical Guide to Hybrid Cloud Computing  http://www.cloud-council.org/deliverables/practical-guide-to-hybrid-cloud-computing.htm  Practical Guide to Platform-as-a-Service  http://www.cloud-council.org/deliverables/practical-guide-to-platform-as-a-service.htm  Practical Guide to Cloud Management Platforms  http://www.cloud-council.org/deliverables/practical-guide-to-cloud-management-platforms.htm ©2017 Cloud Standards Customer Council 19
  • 20. Thank You! Join the conversation www.cloud-council.org